Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Within

Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Within

Learn how to build a defence programme against insider threats with this indispensable guide, and discover:

  • Common characteristics of insider threat victims;
  • Typical stages of a malicious attack;
  • Steps you can take to implement a successful insider threat programme ; and
  • How to construct a three-tier security culture, encompassing artefacts , values and shared assumptions.
Ready to order
Sub Total: R 0,00 (ZAR)
CHECKOUT
 

Other payment options available

 

Learn how to build a defence programme against insider threats

Insiders are not always employees and insider threats are not always intentional.

This new title from Dr Julie Mehan looks beyond perimeter protection tools and shows how a security culture based on international best practice can help mitigate the insider threat to your security.

Discover:

  • The common characteristics of insider threat victims.
  • The typical stages of a malicious attack.
  • The steps you can take to implement a successful insider threat programme.
  • How to construct a three-tier security culture, encompassing artefacts, values and shared assumptions.

 

“The author has many, many sound things to say about security culture and practice.”

Mark Rowe

 

Use international best practice to implement a high-impact plan

Using security controls from the ISO 27001, ISO 27002, and NIST SP 800-53 standards, this title will help you address:

  • Risk mitigation and the eight steps of a risk assessment
  • Staff training and awareness, and conducting background screening
  • Monitoring and auditing the activities of general and privileged users, and quickly responding to suspicious behaviours
  • Metrics to measure insider threat behaviour and mitigation
  • The challenge of external or temporary insiders (such as consultants, support contractors, partners, service providers, temporary employees)
  • Layering physical and digital defences to provide defence in depth
  • The importance of conducting regular penetration testing to evaluate security controls
  • Limiting, monitoring and controlling remote access and mobile device use
  • Ensuring supply-chain security
  • Maintaining an incident management capability

 

The insider threat

Every type of organisation is vulnerable to insider abuse, errors or malicious attacks. These can impact reputation, operations and profitability, and expose data, harm the organisation, or deliver valuable intellectual property into competitors’ hands.

Insiders can be current or former employees, contractors, or other business partners who have been granted authorised access to networks, systems or data, and all of them can bypass security measures through legitimate means.

Prepare for insider threats with the most in-depth guide on the market and build a defence programme using international best practice.

Order your copy today.

 

About the author

Dr Julie Mehan is the founder and president of JEMStone Strategies and a principal cyber security analyst in a strategic consulting firm in Virginia. She has delivered cyber security and related privacy services to senior commercial, Department of Defense and federal government clients working in Italy, Australia, Canada, Belgium and the United States. Dr Mehan is also an associate professor at the University of Maryland University College, specialising in courses in cyber security, cyber terror, IT in organisations, and ethics in an Internet society.

 

Authors: Julie E. Mehan
Publishers: ITGP
Format: Softcover
ISBN13: 9781849288392
Pages: 312
Published: 20 Sep 2016
Availability: Available

Product Rating: (5.00)   # of Ratings: 1   (Only registered customers can rate)

(Only registered customers can rate)

1 - Terrible
2 - Bad
3 - OK
4 - Good
5 - Great
0% 50% 100%

Sort: New to Old RE-SORT COMMENTS:

Showing comments 1-1 of 1
1. Mark Rowe on 12/1/2016, said:

The author has many, many sound things to say about security culture and practice… She ranges over policy, training, personnel management, reacting and recovering from an insider breach, and some 'worst practices' to avoid, which is a neat way of looking at the issue.
Was this comment helpful? yes no   (0 people found this comment helpful, 0 did not)
Showing comments 1-1 of 1